Mike Hamilton
About Mike Hamilton
Mike Hamilton is a Senior Penetration Tester at Centric Consulting, where he has worked remotely since 2024. He has a diverse background in information security, with previous roles in various organizations, including Beam Benefits and Covail, spanning over a decade.
Work at Centric Consulting
Mike Hamilton has been employed at Centric Consulting as a Senior Penetration Tester since 2024. He works remotely from Columbus, Ohio. In this role, he is responsible for identifying vulnerabilities in systems and applications, conducting security assessments, and providing recommendations for improving security posture.
Previous Employment History
Prior to his current position, Mike Hamilton held various roles in cybersecurity. He worked at Beam Benefits as a Senior Product Security Engineer for three months in 2024. He also served as the Manager of Offensive Security at Covail from 2020 to 2021 and as an Adversarial Engineer there from 2016 to 2020. His experience includes positions at the State of Ohio as a Network Specialist and Data Security Supervisor 2, as well as roles at Appian Way Advisory Services and EXPRESS.
Education and Expertise
Mike Hamilton studied Criminal Justice at North Central Technical College, earning an Associate's Degree from 1994 to 1996. He furthered his education at the SANS Institute, focusing on Information Security and Forensics, where he obtained certifications from 2008 to 2010. Additionally, he has training from New Horizons, enhancing his skill set in cybersecurity.
Background in Incident Response
Mike Hamilton has a strong background in incident response, which is critical for managing and mitigating security breaches. His extensive experience spans various sectors, including state and local government, large university environments, and enterprise retail organizations. This diverse background equips him with the skills necessary to address complex security challenges.
Comprehensive Skill Set
Mike Hamilton possesses a comprehensive skill set that includes network and server administration, which contributes to his effectiveness in security operations. He has expertise in designing security policies and procedures, essential for maintaining robust information security frameworks. His experience in both full-time and consulting roles allows him to adapt to various organizational needs.